Episode 96 — Recent Changes: Pennsylvania SB 696 and Utah S.B. 127

Pennsylvania Senate Bill 696 updates the state’s breach-notification framework by modernizing the definition of personal information and expanding the list of sensitive elements that trigger notification. Historically, statutes focused on combinations like name plus Social Security number or driver’s license number. SB 696 reflects today’s risk landscape by adding categories whose exposure creates rapid, real-world harm, such as medical identifiers, biometric templates, passport and taxpayer IDs, and data needed to authenticate accounts. The expansion recognizes that criminals increasingly monetize nontraditional elements—think benefits fraud tied to medical IDs or synthetic identity fraud using multiple partial records. For you as a practitioner, the practical takeaway is a broader incident intake filter: when scoping an event, you must inventory not only classic identifiers but also these expanded elements to determine if Pennsylvania residents fall into the notifiable population.
A defining change is the explicit inclusion of online credentials and authentication data within covered records. Username-and-password pairs, passcodes, security questions and answers, and multifactor seeds are all treated as high-urgency elements because attackers can weaponize them instantly. SB 696 expects organizations to move beyond disclosure and into immediate containment, which means forcing resets, revoking tokens, and invalidating shared secrets before adversaries pivot. Consider a compromise of a retailer’s login table: notification alone is insufficient; rapid credential rotation and session invalidation are part of the expected remedy. The rule also nudges teams to design credential vaulting, hashing, and salting strategies that reduce the blast radius. Think of credentials as live keys, not just data—SB 696 treats them as such, and your playbooks should too, with automated kill-switches and clear reset pathways.
Pennsylvania’s clarified encryption safe harbor mirrors modern best practice: encryption can excuse notification only if confidentiality remains intact in fact, not just on paper. If an attacker also obtained the decryption key, if keys were co-located with ciphertext, or if obsolete algorithms were used, safe harbor collapses. The bill effectively connects legal relief to key management hygiene—separation of duties, hardware-backed key storage, rotation schedules, and tamper-evident audit trails. Practically, this pushes teams to treat encryption as a system, not a box to tick. When you evaluate an incident, you must ask two questions: was the data strongly encrypted, and were keys demonstrably protected? If you cannot answer both affirmatively with evidence, assume notification duty applies. In tabletop exercises, rehearse “key-compromised” branches, because regulators will probe this exact weakness.
SB 696 aligns Pennsylvania with blended trigger logic by clarifying the threshold between harm-based and acquisition- or access-based triggers. Some events are notifiable upon unauthorized acquisition of covered data; others hinge on a reasonable-likelihood-of-harm assessment. The statute’s language encourages documented, time-bound risk analysis rather than open-ended speculation. Your incident commander should use a structured rubric: data category, actor intent, dwell time, evidence of exfiltration, compensating controls, and observed misuse. Where evidence is ambiguous—say, log gaps with strong circumstantial indicators—Pennsylvania’s policy preference tilts toward transparency, especially for high-risk elements like credentials or biometrics. Treat the harm test as a disciplined decision, not a loophole: write down inputs, reasoning, and outcome, and be prepared to revisit the call as facts evolve. Documentation will carry significant weight in post-incident reviews.
Timing under SB 696 retains the anchor of “without unreasonable delay,” but the practical bar rises as forensic and notification capabilities mature. Regulators expect readiness: pre-approved templates, vendor rosters, letter shops, and call center scripts. If investigations require days to stabilize scoping, parallelize drafting and channel setup so the clock is not idly ticking. Your internal service-level objectives should be stricter than the statute: set internal targets for discovery-to-triage, triage-to-determination, and determination-to-notice. Build dashboards that surface aging cases and blockers. “Unreasonable delay” is judged against the maturity of your program; in 2025, delayed basics—like waiting a week to force credential resets—will be hard to defend. Embed timeboxing into your incident runbooks and rehearse timeline compressions in tabletops so the team knows how to move when hours matter.
Pennsylvania preserves a classic law-enforcement delay allowance, but it expects discipline in how you invoke it. A documented request from an investigating agency can justify deferral, yet deferral is not indefinite. Maintain a dated copy of the hold, calibrate the scope of deferred disclosure to the investigative need, and set reminders to re-check status. When clearance arrives, move immediately—pre-drafted notices and configured channels matter here. Avoid over-withholding: consumers can still be warned with general safety steps, even if certain investigative details must remain sealed. The north star is consumer protection, not secrecy; law enforcement recognizes this balance. Your breach file should clearly track the deferral window: request date, duration, authorizing official, renewal or lift date, and your notification release timestamp once the gag is lifted.
Content requirements under SB 696 emphasize clarity, specificity, and actionability. Individuals should learn what happened, what categories were involved, the estimated incident window, what you are doing to remediate, and what they can do next. Avoid hedging language or minimizing risk; instead, provide concrete steps—credential resets, fraud alerts, credit freezes, and how to access any complimentary monitoring. Use plain language, headings, and short paragraphs; add multilingual support where your customer base warrants it. Remember that content is a risk control: a well-structured letter reduces confusion, call spikes, and phishing susceptibility. Align all channels—letters, FAQ pages, and call scripts—so consumers receive consistent guidance. Above all, ensure the notice matches facts; regulators scrutinize divergence between forensic findings and consumer messaging as a signal of cultural candor.
Attorney General outreach under Pennsylvania’s regime is triggered by volume and characteristics of the breach, with format guidance that favors consistency and completeness. Treat regulator submissions as an audit packet: cover timeline, population counts by category, notification content, law-enforcement coordination status, and security improvements undertaken. Provide contact details for a knowledgeable incident lead who can field follow-ups. Submitting early, even while investigations continue, can establish good faith; supplement as scope refines. Maintain a regulator-submission checklist tied to SB 696’s specifics, and pre-test portals or email channels so authentication or file-size issues don’t delay filing. Think of the AG package as your official narrative—factual, neutral, and comprehensive—anticipating questions about triggers, encryption, minors, and cross-state mapping. Your professionalism here sets the tone for the rest of the engagement.
Credit bureau notification remains a coordination point when affected Pennsylvania residents exceed thresholds or when certain identity elements are compromised. Build a standing playbook with bureau contacts, required fields, and preferred file formats so you can transmit clean lists quickly. Coordinate timing so individual notices, regulator filings, and bureau alerts land in a synchronized window—this helps consumers place the event in context and reduces confusion. When Social Security numbers are involved, align bureau outreach with the activation of credit monitoring or fraud assistance you are offering. Track delivery confirmations and retain submission receipts in the breach file. Remember: bureau coordination is not just a checkbox; it is part of the protective ecosystem that helps residents prevent downstream harm when sensitive identifiers are exposed.
Vendor and service provider duties under SB 696 focus on prompt controller notification and cooperation. Contracts should require discovery-to-notice intervals—e.g., twenty-four hours—to ensure you can meet your statutory window. They should also compel access to forensic artifacts, logs, and personnel for interviews, and they should stipulate a secure evidence-handling process. During an event, convene joint war rooms to prevent context gaps between your teams and the vendor’s responders. Post-incident, conduct a joint lessons-learned review and capture remediation commitments in writing with dates and owners. Vendor delay is controller risk: flow-down clauses, audit rights, and meaningful penalties for non-cooperation are practical—not punitive—tools that protect your residents and your regulatory posture under Pennsylvania’s updated framework.
Public posting and substitute notice pathways remain available for large-scale events or incomplete contact data. SB 696 expects organizations to use prominent web placement, press releases, and regional media when direct notice is infeasible or cost-prohibitive, but “substitute” is not an excuse for thin communications. Build a dedicated incident landing page with the letter content, FAQs, and links to remediation services; ensure the page is accessible, mobile-friendly, and optimized for search so consumers can find it quickly. Archive screenshots and publication timestamps for your audit file. Coordinate messaging cadence across channels to avoid mixed signals—if your letter directs consumers to a page, that page must already be live with consistent, current information at the moment letters land.
SB 696 heightens attention to minors and education-adjacent data, reinforcing the need for guardian-centric communication. If student records or youth platform credentials are implicated, route notices to parents or guardians where appropriate, and coordinate with schools or districts when they are data owners. Tailor content to explain steps adults can take on a child’s behalf—password resets, account monitoring, and watching for targeted social engineering. When minors are involved, consider longer monitoring offers or additional safety guidance, recognizing the unique, long-tail risks of identity misuse for children. Your incident file should document how you identified minor populations, selected channels, and ensured that schools or education agencies received timely, accurate information aligned with their own statutory timelines and obligations.
Sector coordination remains necessary where SB 696 overlaps with federal or domain-specific rules. Healthcare incidents may trigger HIPAA’s sixty-day rule and HHS filings; financial incidents raise GLBA considerations and require harmonized timing with banking regulators; telecom incidents can invoke FCC guidance. Build a crosswalk that maps Pennsylvania’s duties to sector overlays, choosing the most protective timelines and content elements when overlaps occur. Your goal is coherence: a single, consistent notice program that simultaneously satisfies SB 696 and sector mandates. Maintain a regulator-contact matrix and practice multi-regulator submissions in tabletop drills so your team knows sequencing, portal quirks, and attachment expectations before a real event, reducing friction when hours and accuracy matter most.
Finally, SB 696 reinforces recordkeeping and breach log retention as the spine of defensibility. Preserve a complete, chronological file: discovery time, containment steps, scoping decisions, harm analyses, law enforcement deferrals, notice drafts, approval stamps, mailing proofs, web captures, call scripts, and regulator submissions. Include counsel-directed memoranda that explain legal reasoning for triggers, timing, and safe-harbor determinations. Retain logs for the statutory period and control access to protect privilege where appropriate. In audits and inquiries, well-organized documentation converts assertions into proof, showing that decisions were timely, informed, and proportionate. Treat the breach file as a product of your program: its completeness is a proxy for maturity, and under SB 696, maturity is what regulators increasingly expect to see.
For more cyber related content and books, please check out cyber author dot me. Also, there are other prepcasts on Cybersecurity and more at Bare Metal Cyber dot com.
Utah S.B. 127 updates the state’s breach framework by clarifying covered personal data elements and tightening the scope of “security breach.” The definition now more explicitly captures categories beyond classic identifiers, including certain health, biometric, and authentication data whose misuse produces fast-moving harm. At the same time, Utah refines the breach concept to focus on unauthorized acquisition or access that compromises confidentiality, integrity, or availability, with practical emphasis on confidentiality for consumer notice. For response leaders, the implication is a cleaner decision tree: if protected elements were viewed, copied, or exfiltrated without authorization—and compensating controls like strong, uncompromised encryption aren’t present—assume the duty to notify Utah residents. Build your intake questionnaires and forensic scoping checklists to reflect these clarifications so determinations are faster, better documented, and less subject to replay debates during regulator follow-up.
S.B. 127 sharpens notification timelines for both individuals and authorities, while retaining the anchor of “without unreasonable delay.” Establish internal targets that beat statutory expectations—e.g., determination within ten days of discovery, draft notices within five days of determination, and dispatch within the shortest applicable window among affected states. Utah’s clarity should encourage proactive sequencing: parallelize credential resets, regulator drafts, and call center activation rather than waiting for a perfectly bounded scope. When uncertainty remains, send initial notices with clear language that you will update as new facts emerge. Regulators judge professionalism by preparation and speed; “unreasonable delay” is less about the calendar and more about whether you used time wisely to protect people promptly while preserving investigative integrity.
Utah’s triggers for Attorney General and consumer reporting agency notifications follow volume-based thresholds, requiring early population estimates. Build your scoping engine to classify Utah residents quickly—by billing address, service location, or verified contact—and to count unique individuals by data element. Coordinate AG filings with consumer notices and bureau alerts so the broader ecosystem is primed for questions and fraud spikes. For multi-state incidents, maintain a tracker of each state’s thresholds and portals; Utah’s additions should slot neatly into that tracker. Precision matters here: if counts change, update filings promptly and preserve deltas in the breach file. Regulators appreciate candor and version control, especially when you can show how new forensic artifacts adjusted the scope and why supplemental notices were necessary.
Utah specifies content items for consumer notices and discourages language that minimizes risk without evidence. Your letters should communicate the incident date range, categories exposed, what you have done to contain the issue, concrete steps individuals can take, and how to enroll in any remediation you offer. Avoid generic reassurances like “we have no evidence of misuse” unless accompanied by transparent explanation of why—e.g., full disk encryption intact, no log evidence of exfiltration, and keys confirmed safe. Pair clarity with empathy: write at a sixth- to eighth-grade reading level, include accessible formats, and add alternatives for those without easy digital access. Clarity reduces confusion and phishing risk; empathy reduces frustration and call center spikes, improving overall incident outcomes for residents and regulators alike.
Credential incidents receive special attention under S.B. 127, echoing national trends. When usernames and passwords or multifactor seeds are implicated, Utah expects decisive containment: forced resets, token revocation, session invalidation, and advisories about credential reuse across services. For design resilience, move toward passwordless options and hardware-backed keys that limit blast radius. In notices, separate “what happened” from “what you should do now,” and include links to reputable guidance on password managers and phishing avoidance. Treat credential breaches like a fire—contain first, then communicate. Time spent crafting the perfect letter is wasted if active sessions remain open or tokens continue to authorize access. Structure your runbooks to launch containment in minutes, not days, with preapproved workflows and on-call engineering support.
Vendor-to-controller notice duties in Utah stress “without unreasonable delay,” backed by cooperation during investigations. Bake tight discovery-to-notice SLAs into contracts—twenty-four hours for initial alert, rolling updates every twelve to twenty-four hours—and require access to logs, evidence, and personnel. Pre-negotiate incident points of contact, escalation ladders, and joint communications protocols. During an event, open a shared workspace for evidence exchange and timeline reconciliation; after, capture remediation commitments with named owners and due dates. Utah’s standard amplifies a universal truth: your ability to notify residents on time depends on your vendors’ transparency. Treat vendor diligence as a first-line control, validated through tabletop drills and periodic evidence-of-compliance reviews.
Substitute notice remains a last-resort path when direct contact is infeasible or cost-prohibitive. Utah’s criteria align with common standards—large populations, missing contact details, or extraordinary costs justify multi-channel campaigns. In practice, that means prominent website banners, media releases, and dedicated FAQs, all live at launch. Build language that helps consumers distinguish authentic postings from scams—use consistent branding, HTTPS-only links, and a verification path from your main homepage. Archive screenshots, publication times, and media confirmations for your audit set. Substitute notice should feel like a coordinated public-service message, not an afterthought; when executed well, it preserves reach and trust even without individualized communications.
Law enforcement deferral mechanics in Utah require documented proof of need. Secure written requests—emails or letters—from the investigating agency that specify the delay window, then timebox your response tasks so you can drop notices the moment clearance is granted. Use the quiet period to finalize drafts, assemble mailing lists, and configure call centers—deferral is preparation time, not pause time. In your breach file, keep the deferral document, the clearance timestamp, and the notification release timestamp together, demonstrating clean custody of the delay decision. If the window extends, request renewals in writing. Regulators will evaluate whether you honored both the investigation and the resident’s right to timely information.
Utah’s updates intersect with the Utah Consumer Privacy Act (UCPA), which governs broader privacy practices. Align your breach program with your privacy operations: the same data maps, retention schedules, and vendor contracts that support UCPA compliance should feed incident scoping and notification workflows. If sensitive categories under UCPA are exposed—biometrics, precise geolocation, health—treat those populations as high-priority cohorts for expedited notice and enhanced remediation. The convergence of breach and privacy programs is deliberate: better inventories, shorter retention, and stronger contracts reduce breach impact and accelerate accurate notices. Make privacy-by-design a breach-mitigation control—less unnecessary data means smaller blast radii when incidents occur.
Children’s data, biometric identifiers, and precise location data merit escalation under S.B. 127. For minors, adjust channels toward parents or guardians, and consider heightened safety guidance beyond credit monitoring—social engineering tips, location sharing reviews, and account hygiene. For biometrics, explain clearly that templates (not raw images) were exposed if applicable, and outline revocation and re-enrollment steps for access systems. For precise location, advise immediate review of app permissions and device settings. In each case, tune your remediation to the unique risks: a one-size offer does not match the lived realities of these categories. Document why you chose particular mitigations; Utah’s clarity invites equally clear rationale in your response file.
Because breaches rarely respect borders, adopt a most-protective baseline that satisfies Utah while covering stricter peers. Set your internal deadline to the shortest state timeline across the affected population; include the richest common content set; and assume credential-reset requirements where any state demands them. Build a jurisdiction matrix that your response team can consult in minutes, not hours, and pre-map authority portals and attachment lists. This reduces decision friction and prevents split-brain letters that confuse consumers. Utah’s clarity should be one anchor in that matrix, harmonized with California, Colorado, and Pennsylvania to create a single, confident response motion when the pressure is highest.
Evidence artifacts deserve meticulous curation under S.B. 127. Preserve the discovery timestamp, containment steps, forensic milestones, harm analysis worksheets, regulator filings, consumer templates, mailing proofs, and web captures. Include counsel-directed memoranda that explain trigger calls, encryption-safe-harbor determinations, and the reasons for law-enforcement delays. Assign an owner for the breach file who is accountable for completeness and index it so external reviewers can follow the narrative without guesswork. In Utah, as elsewhere, strong documentation turns a good response into a defensible one—proof that decisions were principled, timely, and proportionate to the facts as they were known.
Metrics close the loop by quantifying performance: mean time to scope, mean time to notify, percentage of Utah residents reached on first pass, bounce and return-mail rates, call center handle times, and remediation enrollment rates. Display these on dashboards that leadership reviews in weekly risk meetings, and build action items where targets are missed. Regulators increasingly ask for evidence that programs are measured and improved, not just designed. If your data shows chronic delay in credential-reset execution, fix the pipeline; if notice emails bounce at high rates, refine addresses and add alternative channels. The metric is not the goal—the improved outcome is.
Post-incident remediation in Utah should be summarized for regulators and consumers alike. Describe system hardening—patched vulnerabilities, new EDR coverage, network segmentation, backup integrity checks—and program changes like shortened retention, stronger vendor SLAs, or refined tabletop cadence. Avoid vague pledges; provide concrete timelines and owners. Public assurance statements build trust only when paired with action, and regulators will take note when you convert lessons into durable controls. In your closeout memo, tie each remediation to a root cause or contributing factor from the investigation. That narrative demonstrates a learning culture—one that reduces the likelihood and impact of future incidents under Utah’s updated breach framework.
In sum, Pennsylvania and Utah’s updates push breach programs toward crisper scoping, faster decisioning, tighter vendor discipline, and better proof. Treat their changes as catalysts to sharpen playbooks, modernize templates, and build auditable evidence from the first hour of response.

Episode 96 — Recent Changes: Pennsylvania SB 696 and Utah S.B. 127
Broadcast by